Network Security Fundamentals

Security is not an afterthought; it is built into the network design. From firewalls to VPNs, defense in depth is key.

1. The CIA Triad

Every security decision balances these three pillars:

2. Firewalls: Packet Filtering vs Stateful

A firewall sits at the perimeter (or internally) to enforce policy.

Standard vs Extended ACLs (Cisco Syntax)

Type Range Features Placement
Standard 1-99 Source IP only. Close to Destination.
Extended 100-199 Source, Destination, Protocol, Port. Close to Source (Drop early).

3. VPNs (Virtual Private Networks)

VPNs extend a private network across a public network (Internet) using tunneling (GRE/IPsec) and encryption.

Engineer's Notebook: IPsec IKE Phases

Phase 1 (IKE SA): Authenticate peers (Pre-Shared Key / Certs) and negotiate encryption for the management channel. (UDP 500).

Phase 2 (IPsec SA): Negotiate encryption for the actual data traffic (ESP/AH). (Protocol 50).

Troubleshooting Tip: "Phase 1 is up, Phase 2 is down" usually means a mismatch in the crypto map (ACLs or Transform Sets).

4. Common Network Attacks

Test Your Security Knowledge

Think you know your firewalls from your VPNs? Take the quiz to find out.

Start Security Quiz →

References